Docs / Security Controls

Control map

This map ties each security claim to a specific control, decision flow, and evidence output.

How to use

1. Review control

Understand the control definition.

2. Verify implementation

Confirm evidence output exists.

3. Export proof

Generate evidence for auditors.

4. Monitor drift

Track changes to control posture.

Execution controls

Identity + access

Audit + evidence

Key API endpoints

GET /compliance/controls — control map snapshot

Evidence outputs

Control map export
Evidence mapping